Integrity Preserving Outsourcing Model in Cloud with Proxy Based Public Auditing

Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0

Abstract

Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services. Secured data storage and retrieval is challenging when the storage system is distributed and has no central authority further, security risk is developed towards accuracy of data in cloud i.e., the client’s outsourced data is securely stored by the storage server or not. To address these issues we propose a scheme that uses Random key generation and Session tracking methodology that serves to identify unauthorized users who try to steal the information stored in cloud. We have also modulated the work done by cloud admin and data owner by introducing a proxy and a third party auditor which assists in auditing and repairing activity. Thus our scheme ensures the integrity of the outsourced data and also focuses on identifying and reporting unauthorized users.

Authors and Affiliations

Ahamed Ali S. , Dr. M. Ramakrishnan

Keywords

Related Articles

Enterprise Architecture Development of Mercu Buana University Based on TOGAF: An Introduction

This paper proposed TOGAF to develop enterprice architecture of Mercu Buana University due to sharp increasing in number of students. This development must keep in line the bussines goal and information system used in Un...

Multicast Routing and Data Mining in Wired Networks: A Comprehensive Study

Multicast routing is a collection leaning massage whose objective is to hold the spread of data from a dispatcher to all the recipient of a multicast group while annoying to use the obtainable bandwidth professionally, i...

ANALYSIS ON THE QUALITY OF THREE-PHASE TRANSFORMER OIL

Tangent delta is an electrical diagnostic method to determine the condition of the insulation. One of the insulation to know is transformer oil being a liquid insulation. In a transformer, insulation is an important part...

The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System

Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment....

Study on Calibration of Sea Wave Height Using Synthetic Aperture Radar Image Based on Grey Level Co-occurrence Matrix: Case on Multi Polarization P Band

Indonesian archipilago had 70% sea area of its total area. Due to safety factor in sea transportation fishery and tourism, sea wave height in all area in Indonesia must be known. Lack of the information on the height of...

Download PDF file
  • EP ID EP182635
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Ahamed Ali S. , Dr. M. Ramakrishnan (2016). Integrity Preserving Outsourcing Model in Cloud with Proxy Based Public Auditing. International Research Journal of Computer Science, 0(0), 1-6. https://europub.co.uk/articles/-A-182635